mirror of
https://github.com/PurpleI2P/i2pd.git
synced 2025-06-22 05:48:20 +02:00
use EVP interface for ECDSA signatures if openssl 3
Some checks are pending
Build Debian packages / bookworm (push) Waiting to run
Build Debian packages / bullseye (push) Waiting to run
Build Debian packages / buster (push) Waiting to run
Build on FreeBSD / with UPnP (push) Waiting to run
Build on OSX / With USE_UPNP=no (push) Waiting to run
Build on OSX / With USE_UPNP=yes (push) Waiting to run
Build on Windows / CMake ucrt-x86_64 (push) Waiting to run
Build on Windows / clang-x86_64 (push) Waiting to run
Build on Windows / i686 (push) Waiting to run
Build on Windows / ucrt-x86_64 (push) Waiting to run
Build on Windows / x86_64 (push) Waiting to run
Build on Windows / CMake clang-x86_64 (push) Waiting to run
Build on Windows / CMake i686 (push) Waiting to run
Build on Windows / CMake x86_64 (push) Waiting to run
Build on Windows / XP (push) Waiting to run
Build on Ubuntu / Make with USE_UPNP=no (push) Waiting to run
Build on Ubuntu / Make with USE_UPNP=yes (push) Waiting to run
Build on Ubuntu / CMake with -DWITH_UPNP=OFF (push) Waiting to run
Build on Ubuntu / CMake with -DWITH_UPNP=ON (push) Waiting to run
Build containers / Building container for linux/amd64 (push) Waiting to run
Build containers / Building container for linux/arm64 (push) Waiting to run
Build containers / Building container for linux/arm/v7 (push) Waiting to run
Build containers / Building container for linux/386 (push) Waiting to run
Build containers / Pushing merged manifest (push) Blocked by required conditions
Some checks are pending
Build Debian packages / bookworm (push) Waiting to run
Build Debian packages / bullseye (push) Waiting to run
Build Debian packages / buster (push) Waiting to run
Build on FreeBSD / with UPnP (push) Waiting to run
Build on OSX / With USE_UPNP=no (push) Waiting to run
Build on OSX / With USE_UPNP=yes (push) Waiting to run
Build on Windows / CMake ucrt-x86_64 (push) Waiting to run
Build on Windows / clang-x86_64 (push) Waiting to run
Build on Windows / i686 (push) Waiting to run
Build on Windows / ucrt-x86_64 (push) Waiting to run
Build on Windows / x86_64 (push) Waiting to run
Build on Windows / CMake clang-x86_64 (push) Waiting to run
Build on Windows / CMake i686 (push) Waiting to run
Build on Windows / CMake x86_64 (push) Waiting to run
Build on Windows / XP (push) Waiting to run
Build on Ubuntu / Make with USE_UPNP=no (push) Waiting to run
Build on Ubuntu / Make with USE_UPNP=yes (push) Waiting to run
Build on Ubuntu / CMake with -DWITH_UPNP=OFF (push) Waiting to run
Build on Ubuntu / CMake with -DWITH_UPNP=ON (push) Waiting to run
Build containers / Building container for linux/amd64 (push) Waiting to run
Build containers / Building container for linux/arm64 (push) Waiting to run
Build containers / Building container for linux/arm/v7 (push) Waiting to run
Build containers / Building container for linux/386 (push) Waiting to run
Build containers / Pushing merged manifest (push) Blocked by required conditions
This commit is contained in:
parent
4828d93257
commit
660dbd27d1
2 changed files with 285 additions and 6 deletions
|
@ -10,6 +10,7 @@
|
||||||
#include <openssl/evp.h>
|
#include <openssl/evp.h>
|
||||||
#if (OPENSSL_VERSION_NUMBER >= 0x030000000) // since 3.0.0
|
#if (OPENSSL_VERSION_NUMBER >= 0x030000000) // since 3.0.0
|
||||||
#include <openssl/core_names.h>
|
#include <openssl/core_names.h>
|
||||||
|
#include <openssl/param_build.h>
|
||||||
#endif
|
#endif
|
||||||
#include "Log.h"
|
#include "Log.h"
|
||||||
#include "Signature.h"
|
#include "Signature.h"
|
||||||
|
@ -175,6 +176,177 @@ namespace crypto
|
||||||
}
|
}
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
|
#if (OPENSSL_VERSION_NUMBER >= 0x030000000) // since 3.0.0
|
||||||
|
ECDSAVerifier::ECDSAVerifier (int curve, size_t keyLen, const EVP_MD * hash):
|
||||||
|
m_Curve(curve), m_KeyLen (keyLen), m_Hash (hash), m_PublicKey (nullptr)
|
||||||
|
{
|
||||||
|
}
|
||||||
|
|
||||||
|
ECDSAVerifier::~ECDSAVerifier ()
|
||||||
|
{
|
||||||
|
if (m_PublicKey)
|
||||||
|
EVP_PKEY_free (m_PublicKey);
|
||||||
|
}
|
||||||
|
|
||||||
|
void ECDSAVerifier::SetPublicKey (const uint8_t * signingKey)
|
||||||
|
{
|
||||||
|
if (m_PublicKey)
|
||||||
|
{
|
||||||
|
EVP_PKEY_free (m_PublicKey);
|
||||||
|
m_PublicKey = nullptr;
|
||||||
|
}
|
||||||
|
auto plen = GetPublicKeyLen ();
|
||||||
|
std::vector<uint8_t> pub(plen + 1);
|
||||||
|
pub[0] = POINT_CONVERSION_UNCOMPRESSED;
|
||||||
|
memcpy (pub.data() + 1, signingKey, plen); // 0x04|x|y
|
||||||
|
OSSL_PARAM_BLD * paramBld = OSSL_PARAM_BLD_new ();
|
||||||
|
OSSL_PARAM_BLD_push_utf8_string (paramBld, OSSL_PKEY_PARAM_GROUP_NAME, OBJ_nid2ln(m_Curve), 0);
|
||||||
|
OSSL_PARAM_BLD_push_octet_string (paramBld, OSSL_PKEY_PARAM_PUB_KEY, pub.data (), pub.size ());
|
||||||
|
OSSL_PARAM * params = OSSL_PARAM_BLD_to_param(paramBld);
|
||||||
|
|
||||||
|
EVP_PKEY_CTX *ctx = EVP_PKEY_CTX_new_from_name (NULL, "EC", NULL);
|
||||||
|
if (ctx)
|
||||||
|
{
|
||||||
|
if (EVP_PKEY_fromdata_init (ctx) <= 0 ||
|
||||||
|
EVP_PKEY_fromdata (ctx, &m_PublicKey, EVP_PKEY_PUBLIC_KEY, params) <= 0)
|
||||||
|
LogPrint (eLogError, "ECDSA can't create PKEY from params");
|
||||||
|
EVP_PKEY_CTX_free (ctx);
|
||||||
|
}
|
||||||
|
else
|
||||||
|
LogPrint (eLogError, "ECDSA can't create PKEY context");
|
||||||
|
|
||||||
|
OSSL_PARAM_free (params);
|
||||||
|
OSSL_PARAM_BLD_free (paramBld);
|
||||||
|
}
|
||||||
|
|
||||||
|
bool ECDSAVerifier::Verify (const uint8_t * buf, size_t len, const uint8_t * signature) const
|
||||||
|
{
|
||||||
|
bool ret = false;
|
||||||
|
EVP_PKEY_CTX * ctx = EVP_PKEY_CTX_new (m_PublicKey, NULL);
|
||||||
|
if (!ctx)
|
||||||
|
{
|
||||||
|
LogPrint (eLogError, "ECDSA can't create verification context");
|
||||||
|
return false;
|
||||||
|
}
|
||||||
|
// digest
|
||||||
|
unsigned int digestLen = EVP_MD_size(m_Hash);
|
||||||
|
std::vector<uint8_t> digest(digestLen), sign(GetSignatureLen () + 8);
|
||||||
|
EVP_MD_CTX * mdCtx = EVP_MD_CTX_create ();
|
||||||
|
EVP_DigestInit (mdCtx, m_Hash);
|
||||||
|
EVP_DigestUpdate (mdCtx, buf, len);
|
||||||
|
EVP_DigestFinal (mdCtx, digest.data (), &digestLen);
|
||||||
|
EVP_MD_CTX_destroy (mdCtx);
|
||||||
|
// signature
|
||||||
|
ECDSA_SIG * sig = ECDSA_SIG_new();
|
||||||
|
ECDSA_SIG_set0 (sig, BN_bin2bn (signature, GetSignatureLen ()/2, NULL),
|
||||||
|
BN_bin2bn (signature + GetSignatureLen ()/2, GetSignatureLen ()/2, NULL));
|
||||||
|
// to DER format
|
||||||
|
uint8_t * s = sign.data ();
|
||||||
|
auto l = i2d_ECDSA_SIG (sig, &s);
|
||||||
|
ECDSA_SIG_free(sig);
|
||||||
|
//verify
|
||||||
|
if (EVP_PKEY_verify_init (ctx) > 0 && EVP_PKEY_public_check (ctx) > 0)
|
||||||
|
{
|
||||||
|
if (EVP_PKEY_CTX_set_signature_md (ctx, m_Hash) > 0)
|
||||||
|
ret = EVP_PKEY_verify (ctx, sign.data (), l, digest.data (), digestLen);
|
||||||
|
else
|
||||||
|
LogPrint (eLogError, "ECDSA can't set signature md");
|
||||||
|
}
|
||||||
|
else
|
||||||
|
LogPrint (eLogError, "ECDSA invalid public key");
|
||||||
|
EVP_PKEY_CTX_free (ctx);
|
||||||
|
return ret;
|
||||||
|
}
|
||||||
|
|
||||||
|
ECDSASigner::ECDSASigner (int curve, size_t keyLen, const EVP_MD * hash, const uint8_t * signingPrivateKey):
|
||||||
|
m_KeyLen (keyLen), m_Hash(hash), m_PrivateKey (nullptr)
|
||||||
|
{
|
||||||
|
BIGNUM * priv = BN_bin2bn (signingPrivateKey, keyLen/2, NULL);
|
||||||
|
OSSL_PARAM_BLD * paramBld = OSSL_PARAM_BLD_new ();
|
||||||
|
OSSL_PARAM_BLD_push_utf8_string (paramBld, OSSL_PKEY_PARAM_GROUP_NAME, OBJ_nid2ln(curve), 0);
|
||||||
|
OSSL_PARAM_BLD_push_BN (paramBld, OSSL_PKEY_PARAM_PRIV_KEY, priv);
|
||||||
|
OSSL_PARAM * params = OSSL_PARAM_BLD_to_param(paramBld);
|
||||||
|
|
||||||
|
EVP_PKEY_CTX *ctx = EVP_PKEY_CTX_new_from_name (NULL, "EC", NULL);
|
||||||
|
if (ctx)
|
||||||
|
{
|
||||||
|
if (EVP_PKEY_fromdata_init (ctx) <= 0 ||
|
||||||
|
EVP_PKEY_fromdata (ctx, &m_PrivateKey, EVP_PKEY_KEYPAIR, params) <= 0)
|
||||||
|
LogPrint (eLogError, "ECDSA can't create PKEY from params");
|
||||||
|
EVP_PKEY_CTX_free (ctx);
|
||||||
|
}
|
||||||
|
else
|
||||||
|
LogPrint (eLogError, "ECDSA can't create PKEY context");
|
||||||
|
|
||||||
|
OSSL_PARAM_free (params);
|
||||||
|
OSSL_PARAM_BLD_free (paramBld);
|
||||||
|
BN_free (priv);
|
||||||
|
}
|
||||||
|
|
||||||
|
ECDSASigner::~ECDSASigner ()
|
||||||
|
{
|
||||||
|
if (m_PrivateKey)
|
||||||
|
EVP_PKEY_free (m_PrivateKey);
|
||||||
|
}
|
||||||
|
|
||||||
|
void ECDSASigner::Sign (const uint8_t * buf, int len, uint8_t * signature) const
|
||||||
|
{
|
||||||
|
unsigned int digestLen = EVP_MD_size(m_Hash);
|
||||||
|
std::vector<uint8_t> digest(digestLen), sign(m_KeyLen + 8);
|
||||||
|
EVP_MD_CTX * mdCtx = EVP_MD_CTX_create ();
|
||||||
|
EVP_DigestInit (mdCtx, m_Hash);
|
||||||
|
EVP_DigestUpdate (mdCtx, buf, len);
|
||||||
|
EVP_DigestFinal (mdCtx, digest.data (), &digestLen);
|
||||||
|
EVP_MD_CTX_destroy (mdCtx);
|
||||||
|
|
||||||
|
EVP_PKEY_CTX * ctx = EVP_PKEY_CTX_new (m_PrivateKey, NULL);
|
||||||
|
if (!ctx)
|
||||||
|
{
|
||||||
|
LogPrint (eLogError, "ECDSA can't create signing context");
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
if (EVP_PKEY_sign_init (ctx) > 0 && EVP_PKEY_private_check (ctx) > 0)
|
||||||
|
{
|
||||||
|
if (EVP_PKEY_CTX_set_signature_md (ctx, m_Hash) > 0)
|
||||||
|
{
|
||||||
|
size_t l = sign.size ();
|
||||||
|
EVP_PKEY_sign (ctx, sign.data (), &l, digest.data (), digest.size ());
|
||||||
|
const uint8_t * s1 = sign.data ();
|
||||||
|
ECDSA_SIG * sig = d2i_ECDSA_SIG (NULL, &s1, l);
|
||||||
|
const BIGNUM * r, * s;
|
||||||
|
ECDSA_SIG_get0 (sig, &r, &s);
|
||||||
|
bn2buf (r, signature, m_KeyLen/2);
|
||||||
|
bn2buf (s, signature + m_KeyLen/2, m_KeyLen/2);
|
||||||
|
ECDSA_SIG_free(sig);
|
||||||
|
}
|
||||||
|
else
|
||||||
|
LogPrint (eLogError, "ECDSA can't set signature md");
|
||||||
|
}
|
||||||
|
else
|
||||||
|
LogPrint (eLogError, "ECDSA invalid private key");
|
||||||
|
EVP_PKEY_CTX_free (ctx);
|
||||||
|
}
|
||||||
|
|
||||||
|
void CreateECDSARandomKeys (int curve, size_t keyLen, uint8_t * signingPrivateKey, uint8_t * signingPublicKey)
|
||||||
|
{
|
||||||
|
EVP_PKEY * pkey = EVP_EC_gen (OBJ_nid2ln(curve));
|
||||||
|
// private
|
||||||
|
BIGNUM * priv = BN_new ();
|
||||||
|
EVP_PKEY_get_bn_param (pkey, OSSL_PKEY_PARAM_PRIV_KEY, &priv);
|
||||||
|
bn2buf (priv, signingPrivateKey, keyLen/2);
|
||||||
|
BN_free (priv);
|
||||||
|
// public
|
||||||
|
BIGNUM * x = BN_new (), * y = BN_new ();
|
||||||
|
EVP_PKEY_get_bn_param (pkey, OSSL_PKEY_PARAM_EC_PUB_X, &x);
|
||||||
|
EVP_PKEY_get_bn_param (pkey, OSSL_PKEY_PARAM_EC_PUB_Y, &y);
|
||||||
|
bn2buf (x, signingPublicKey, keyLen/2);
|
||||||
|
bn2buf (y, signingPublicKey + keyLen/2, keyLen/2);
|
||||||
|
BN_free (x); BN_free (y);
|
||||||
|
EVP_PKEY_free (pkey);
|
||||||
|
}
|
||||||
|
|
||||||
|
#endif
|
||||||
|
|
||||||
#if OPENSSL_EDDSA
|
#if OPENSSL_EDDSA
|
||||||
EDDSA25519Verifier::EDDSA25519Verifier ():
|
EDDSA25519Verifier::EDDSA25519Verifier ():
|
||||||
m_Pkey (nullptr)
|
m_Pkey (nullptr)
|
||||||
|
|
|
@ -92,6 +92,115 @@ namespace crypto
|
||||||
void CreateDSARandomKeys (uint8_t * signingPrivateKey, uint8_t * signingPublicKey);
|
void CreateDSARandomKeys (uint8_t * signingPrivateKey, uint8_t * signingPublicKey);
|
||||||
|
|
||||||
// ECDSA
|
// ECDSA
|
||||||
|
constexpr size_t ECDSAP256_KEY_LENGTH = 64;
|
||||||
|
constexpr size_t ECDSAP384_KEY_LENGTH = 96;
|
||||||
|
constexpr size_t ECDSAP521_KEY_LENGTH = 132;
|
||||||
|
|
||||||
|
#if (OPENSSL_VERSION_NUMBER >= 0x030000000) // since 3.0.0
|
||||||
|
class ECDSAVerifier: public Verifier
|
||||||
|
{
|
||||||
|
public:
|
||||||
|
|
||||||
|
ECDSAVerifier (int curve, size_t keyLen, const EVP_MD * hash);
|
||||||
|
~ECDSAVerifier ();
|
||||||
|
|
||||||
|
void SetPublicKey (const uint8_t * signingKey);
|
||||||
|
bool Verify (const uint8_t * buf, size_t len, const uint8_t * signature) const;
|
||||||
|
|
||||||
|
size_t GetPublicKeyLen () const { return m_KeyLen; };
|
||||||
|
size_t GetSignatureLen () const { return m_KeyLen; }; // signature length = key length
|
||||||
|
|
||||||
|
private:
|
||||||
|
|
||||||
|
int m_Curve;
|
||||||
|
size_t m_KeyLen;
|
||||||
|
const EVP_MD * m_Hash;
|
||||||
|
EVP_PKEY * m_PublicKey;
|
||||||
|
};
|
||||||
|
|
||||||
|
class ECDSASigner: public Signer
|
||||||
|
{
|
||||||
|
public:
|
||||||
|
|
||||||
|
ECDSASigner (int curve, size_t keyLen, const EVP_MD * hash, const uint8_t * signingPrivateKey);
|
||||||
|
~ECDSASigner ();
|
||||||
|
|
||||||
|
void Sign (const uint8_t * buf, int len, uint8_t * signature) const;
|
||||||
|
|
||||||
|
private:
|
||||||
|
|
||||||
|
size_t m_KeyLen;
|
||||||
|
const EVP_MD * m_Hash;
|
||||||
|
EVP_PKEY * m_PrivateKey;
|
||||||
|
};
|
||||||
|
|
||||||
|
void CreateECDSARandomKeys (int curve, size_t keyLen, uint8_t * signingPrivateKey, uint8_t * signingPublicKey);
|
||||||
|
|
||||||
|
// ECDSA_SHA256_P256
|
||||||
|
class ECDSAP256Verifier: public ECDSAVerifier
|
||||||
|
{
|
||||||
|
public:
|
||||||
|
|
||||||
|
ECDSAP256Verifier (): ECDSAVerifier (NID_X9_62_prime256v1, ECDSAP256_KEY_LENGTH, EVP_sha256()) {};
|
||||||
|
};
|
||||||
|
|
||||||
|
class ECDSAP256Signer: public ECDSASigner
|
||||||
|
{
|
||||||
|
public:
|
||||||
|
|
||||||
|
ECDSAP256Signer (const uint8_t * signingPrivateKey):
|
||||||
|
ECDSASigner (NID_X9_62_prime256v1, ECDSAP256_KEY_LENGTH, EVP_sha256(), signingPrivateKey) {};
|
||||||
|
};
|
||||||
|
|
||||||
|
inline void CreateECDSAP256RandomKeys (uint8_t * signingPrivateKey, uint8_t * signingPublicKey)
|
||||||
|
{
|
||||||
|
CreateECDSARandomKeys (NID_X9_62_prime256v1, ECDSAP256_KEY_LENGTH, signingPrivateKey, signingPublicKey);
|
||||||
|
}
|
||||||
|
|
||||||
|
// ECDSA_SHA384_P384
|
||||||
|
class ECDSAP384Verifier: public ECDSAVerifier
|
||||||
|
{
|
||||||
|
public:
|
||||||
|
|
||||||
|
ECDSAP384Verifier (): ECDSAVerifier (NID_secp384r1, ECDSAP384_KEY_LENGTH, EVP_sha384()) {};
|
||||||
|
};
|
||||||
|
|
||||||
|
class ECDSAP384Signer: public ECDSASigner
|
||||||
|
{
|
||||||
|
public:
|
||||||
|
|
||||||
|
ECDSAP384Signer (const uint8_t * signingPrivateKey):
|
||||||
|
ECDSASigner (NID_secp384r1, ECDSAP384_KEY_LENGTH, EVP_sha384(), signingPrivateKey) {};
|
||||||
|
};
|
||||||
|
|
||||||
|
inline void CreateECDSAP384RandomKeys (uint8_t * signingPrivateKey, uint8_t * signingPublicKey)
|
||||||
|
{
|
||||||
|
CreateECDSARandomKeys (NID_secp384r1, ECDSAP384_KEY_LENGTH, signingPrivateKey, signingPublicKey);
|
||||||
|
}
|
||||||
|
|
||||||
|
// ECDSA_SHA512_P521
|
||||||
|
class ECDSAP521Verifier: public ECDSAVerifier
|
||||||
|
{
|
||||||
|
public:
|
||||||
|
|
||||||
|
ECDSAP521Verifier (): ECDSAVerifier (NID_secp521r1, ECDSAP521_KEY_LENGTH, EVP_sha512()) {};
|
||||||
|
};
|
||||||
|
|
||||||
|
class ECDSAP521Signer: public ECDSASigner
|
||||||
|
{
|
||||||
|
public:
|
||||||
|
|
||||||
|
ECDSAP521Signer (const uint8_t * signingPrivateKey):
|
||||||
|
ECDSASigner (NID_secp521r1, ECDSAP521_KEY_LENGTH, EVP_sha512(), signingPrivateKey) {};
|
||||||
|
};
|
||||||
|
|
||||||
|
inline void CreateECDSAP521RandomKeys (uint8_t * signingPrivateKey, uint8_t * signingPublicKey)
|
||||||
|
{
|
||||||
|
CreateECDSARandomKeys (NID_secp521r1, ECDSAP521_KEY_LENGTH, signingPrivateKey, signingPublicKey);
|
||||||
|
}
|
||||||
|
|
||||||
|
#else
|
||||||
|
|
||||||
struct SHA256Hash
|
struct SHA256Hash
|
||||||
{
|
{
|
||||||
static void CalculateHash (const uint8_t * buf, size_t len, uint8_t * digest)
|
static void CalculateHash (const uint8_t * buf, size_t len, uint8_t * digest)
|
||||||
|
@ -217,7 +326,6 @@ namespace crypto
|
||||||
}
|
}
|
||||||
|
|
||||||
// ECDSA_SHA256_P256
|
// ECDSA_SHA256_P256
|
||||||
const size_t ECDSAP256_KEY_LENGTH = 64;
|
|
||||||
typedef ECDSAVerifier<SHA256Hash, NID_X9_62_prime256v1, ECDSAP256_KEY_LENGTH> ECDSAP256Verifier;
|
typedef ECDSAVerifier<SHA256Hash, NID_X9_62_prime256v1, ECDSAP256_KEY_LENGTH> ECDSAP256Verifier;
|
||||||
typedef ECDSASigner<SHA256Hash, NID_X9_62_prime256v1, ECDSAP256_KEY_LENGTH> ECDSAP256Signer;
|
typedef ECDSASigner<SHA256Hash, NID_X9_62_prime256v1, ECDSAP256_KEY_LENGTH> ECDSAP256Signer;
|
||||||
|
|
||||||
|
@ -227,7 +335,6 @@ namespace crypto
|
||||||
}
|
}
|
||||||
|
|
||||||
// ECDSA_SHA384_P384
|
// ECDSA_SHA384_P384
|
||||||
const size_t ECDSAP384_KEY_LENGTH = 96;
|
|
||||||
typedef ECDSAVerifier<SHA384Hash, NID_secp384r1, ECDSAP384_KEY_LENGTH> ECDSAP384Verifier;
|
typedef ECDSAVerifier<SHA384Hash, NID_secp384r1, ECDSAP384_KEY_LENGTH> ECDSAP384Verifier;
|
||||||
typedef ECDSASigner<SHA384Hash, NID_secp384r1, ECDSAP384_KEY_LENGTH> ECDSAP384Signer;
|
typedef ECDSASigner<SHA384Hash, NID_secp384r1, ECDSAP384_KEY_LENGTH> ECDSAP384Signer;
|
||||||
|
|
||||||
|
@ -237,7 +344,6 @@ namespace crypto
|
||||||
}
|
}
|
||||||
|
|
||||||
// ECDSA_SHA512_P521
|
// ECDSA_SHA512_P521
|
||||||
const size_t ECDSAP521_KEY_LENGTH = 132;
|
|
||||||
typedef ECDSAVerifier<SHA512Hash, NID_secp521r1, ECDSAP521_KEY_LENGTH> ECDSAP521Verifier;
|
typedef ECDSAVerifier<SHA512Hash, NID_secp521r1, ECDSAP521_KEY_LENGTH> ECDSAP521Verifier;
|
||||||
typedef ECDSASigner<SHA512Hash, NID_secp521r1, ECDSAP521_KEY_LENGTH> ECDSAP521Signer;
|
typedef ECDSASigner<SHA512Hash, NID_secp521r1, ECDSAP521_KEY_LENGTH> ECDSAP521Signer;
|
||||||
|
|
||||||
|
@ -246,6 +352,7 @@ namespace crypto
|
||||||
CreateECDSARandomKeys (NID_secp521r1, ECDSAP521_KEY_LENGTH, signingPrivateKey, signingPublicKey);
|
CreateECDSARandomKeys (NID_secp521r1, ECDSAP521_KEY_LENGTH, signingPrivateKey, signingPublicKey);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
#endif
|
||||||
|
|
||||||
// EdDSA
|
// EdDSA
|
||||||
class EDDSA25519Verifier: public Verifier
|
class EDDSA25519Verifier: public Verifier
|
||||||
|
|
Loading…
Add table
Add a link
Reference in a new issue